CN107493174B - SSL certificate intelligent binding and management method based on CDN - Google Patents

SSL certificate intelligent binding and management method based on CDN Download PDF

Info

Publication number
CN107493174B
CN107493174B CN201710792015.XA CN201710792015A CN107493174B CN 107493174 B CN107493174 B CN 107493174B CN 201710792015 A CN201710792015 A CN 201710792015A CN 107493174 B CN107493174 B CN 107493174B
Authority
CN
China
Prior art keywords
certificate
domain name
sub
ssl
certificates
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710792015.XA
Other languages
Chinese (zh)
Other versions
CN107493174A (en
Inventor
赵永亮
徐晓林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Knownsec Information Technology Co ltd
Original Assignee
Chengdu Knownsec Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Knownsec Information Technology Co ltd filed Critical Chengdu Knownsec Information Technology Co ltd
Priority to CN201710792015.XA priority Critical patent/CN107493174B/en
Publication of CN107493174A publication Critical patent/CN107493174A/en
Application granted granted Critical
Publication of CN107493174B publication Critical patent/CN107493174B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Abstract

The invention provides an SSL certificate intelligent binding and management method based on a CDN network, which comprises the following steps: step 1: performing certificate operation aiming at a certain root domain name, wherein the certificate operation comprises the steps of uploading a certificate, updating the certificate and deleting the certificate; step 2: the certificate is automatically associated with the sub-domain name, including: 1) extracting all certificates associated with the root domain name; 2) extracting all sub-domain names needing acceleration under the root domain name; 3) traversing the sub-domain names, and associating all certificates associated with each sub-domain name traversing root domain name according to rules; and step 3: SSL intelligent matching is carried out on CDN nodes, namely domain name information is extracted when a request is a handshake request of HTTPS; searching for a related certificate in a local database of the node according to the domain name information; finding out the SSL certificate, decrypting the certificate, extracting the certificate and the private key and establishing HTTPS connection. Aiming at the certificate management of the root domain name, the intelligent matching between the certificate and the user sub-domain name, automatic distribution between the certificate and the CDN node and the like are realized.

Description

SSL certificate intelligent binding and management method based on CDN
Technical Field
The invention relates to the SSL certificate association field, in particular to an SSL certificate intelligent binding and management method based on a CDN.
Background
SSL certificates are one type of digital certificates, similar to electronic copies of driver's licenses, passports, and business licenses, as they are deployed on servers, also referred to as SSL server certificates. The method complies with SSL protocol, is issued by a trusted digital certificate authority CA (such as Globalsign) after the identity of a server is verified, and has server identity verification and data transmission encryption functions. The SSL certificate is created by establishing an SSL (Secure socket layer) between the client browser and the Web server, and the security protocol is designed and developed by Netscape Communication. The security protocol is mainly used for providing authentication of the user and the server; encrypting and hiding the transmitted data; ensuring that data is not altered in transit, i.e., the integrity of the data, has now become a standard for globalization in this field.
In the prior art, an encryption packet is generated by a certificate and a private key uploaded by a user, and is distributed to a corresponding CDN edge node for deployment according to an encryption packet storage path set by the user, and the CDN edge node secondarily encrypts the encryption packet. It has the following disadvantages: 1. determining whether the certificate can match a plurality of sub-domain names based on the certificate uploaded by the user; 2. uncertainty exists when the encrypted packet path set by the user is distributed to the corresponding CDN node, for example, the certificate cannot be matched after the website node is adjusted.
In the system, one or more sub-domain names may exist in one root domain name, a user logs in a CDN account system to upload a plurality of certificates, each certificate may match a plurality of sub-domain names, and how to achieve the best match and meet the personalized requirements for use becomes a critical issue. In addition, each domain name needs to adjust the CDN node where the domain name is located due to a special situation, and how to quickly distribute the certificate to the corresponding CDN node also becomes an urgent problem to be solved.
CDN: the content distribution network improves the response speed of the user for accessing the website. SSL certificate: the system complies with SSL protocol, is issued by a trusted digital Certificate Authority (CA), and has the functions of server authentication and data transmission encryption.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an SSL certificate intelligent binding and management method based on a CDN (content distribution network), aiming at the certificate management of a root domain name, the functions of intelligent matching of a certificate and a user sub-domain name, automatic distribution of the certificate and a CDN node and the like are realized.
In order to solve the technical problems, the invention adopts the technical scheme that:
an SSL certificate intelligent binding and management method based on a CDN comprises the following steps:
step 1: user credential manipulation
The method comprises the following steps of performing certificate operation aiming at a certain root domain name, wherein the certificate operation comprises the steps of uploading a certificate, updating the certificate and deleting the certificate, and specifically comprises the following steps:
the uploading of the certificate comprises: 1) a user synthesizes a domain name SSL certificate, wherein the certificate comprises a website certificate and a private key; 2) selecting a domain name and uploading a certificate; 3) verifying the validity of the certificate, whether the certificate exists or not and whether the certificate is matched with the domain name or not; 4) generating a unique certificate ID-ssl _ ID (ssl _ ID represents a stored unique ID), storing the certificate, and associating the certificate with a domain name; encrypting the certificate, and storing the certificate content, the available domain name and the expiration time;
updating the certificate includes: 1) selecting a designated certificate; 2) uploading a new certificate; 3) verifying whether the certificate is legal or not, whether the certificate is consistent with the original certificate or not, and whether the certificate is matched with the domain name or not; 4) updating the certificate;
deleting the certificate, namely deleting the certificate and the association of the certificate and the domain name;
step 2: the certificate is automatically associated with the sub-domain name, including:
1) extracting all certificates related to the root domain name, including universal analysis of valid certificates; 2) extracting all sub-domain names needing acceleration under the root domain name, including the sub-domain names which are subjected to extensive resolution; 3) traversing the sub-domain names, traversing all certificates associated with the root domain name for each sub-domain name, and preferentially and completely matching the available sub-domain names contained in the certificates; if a plurality of certificates are completely matched with the sub-domain name, selecting the certificate with the longest expiration time for association; if the completely matched certificate is not found, checking whether a universally analyzed certificate exists, if so, matching according to the principle that the SSL certificate has the longest expiration time, wherein if the universally analyzed certificate exists, the matching can be performed; if the matched certificate is not found, the certificate is not associated;
and step 3: CDN node SSL intelligence matches, includes:
1) judging whether the CDN node identifies that the request is a handshake request of HTTPS or an HTTP request, and if the request is the handshake request of the HTTPS, extracting domain name information; 2) searching for a related certificate in a local database of the node according to the domain name information; 3) if finding the SSL certificate, decrypting the certificate, extracting the certificate and the private key and establishing HTTPS connection; otherwise, returning to the HTTPS connection failure.
Further, when uploading and updating certificates, if the user wishes to associate a sub-domain with a particular certificate, the association between the sub-domain and the certificate is preserved during this process.
Further, in the certificate association process, if the user needs to associate a certain sub-domain name with a specific certificate, the association needs to directly associate the certificate in step 1 with the sub-domain name, and the association priority is highest.
Compared with the prior art, the invention has the beneficial effects that: the existing certificate management method does not operate aiming at the root domain name, a user needs to set a certificate storage path, a large amount of operations are needed for the user to manage the certificate, intelligent adjustment cannot be achieved during domain name node adjustment, and manual intervention again may be needed; according to the method, the certificate is bound to the root domain name, and then the intelligent matching rule is combined, so that the degree of manual participation can be greatly reduced, manual re-intervention is not needed when the SSL certificate is synchronized to the CDN node, the optimal matching principle is realized when the CDN node processes a website request, and meanwhile, the special binding requirement of the sub-domain name of a user and the SSL certificate can be met.
Drawings
Fig. 1 is a schematic diagram of a certificate uploading process in the present invention.
Fig. 2 is a schematic diagram of certificate updating process in the present invention.
Fig. 3 is a schematic diagram of certificate intelligent association process in the present invention.
Fig. 4 is a schematic diagram of an SSL intelligent matching process of a CDN node in the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The invention is used for providing safe and reliable service for users by the CDN network, intelligently manages SSL certificates matched with a website (suitable for companies with a large number of certificates of CDN manufacturers); based on SSL certificates uploaded by users, the users are intelligently managed with a root domain name, a plurality of sub domain names and a plurality of certificates, the best matching is realized by combining the certificate content and the sub domain names, the usability and the effectiveness of user websites are guaranteed, and the user website experience and the safety are improved.
The root domain name in the system has many sub domain names, and the sub domain names and the uploaded certificates have special conditions such as extensive resolution, so if a user binds each certificate and each sub domain name respectively, a great deal of effort is consumed, and the association between the certificate and the sub domain names is disordered. Meanwhile, with the adjustment of the domain name node, the SSL certificate needs to be able to be stored in the corresponding CDN node. According to the method and the system, the certificate and the sub-domain name are automatically matched by combining the characteristics of the sub-domain name and the certificate, a user only needs to upload the certificate related to the domain name, intelligent distribution to CDN nodes is achieved, the certificate can be quickly and accurately synchronized to the corresponding node along with adjustment of the domain name node, and the safety and the usability of a user website are improved. The details are as follows:
first, user certificate is uploaded
And performing certificate operation aiming at a certain root domain name, wherein the operation comprises the steps of uploading a certificate, updating the certificate and deleting the certificate, one root domain name is allowed to upload a plurality of certificates, and the domain name is associated with the certificate.
Uploading certificates as shown in fig. 1, includes the steps of:
step 1: a user synthesizes a domain name SSL certificate, wherein the certificate comprises a website certificate and a private key;
step 2: logging in a CDN account management system, selecting a domain name, and uploading a certificate;
and step 3: verifying the validity of the certificate, whether the certificate exists or not and whether the certificate is matched with the domain name or not;
and 4, step 4: generating a unique certificate ID-ssl _ ID, storing the certificate, and associating the certificate with the domain name; and encrypting the certificate, storing the certificate content, the available domain name, the expiration time and the like.
Updating certificates as shown in fig. 2, different from uploading certificates, a specified certificate is selected for updating, and other steps are basically consistent.
The delete certificate operation is the deletion of the certificate and its association with the domain name.
A special case needs to be handled when uploading and updating certificates, and a user wants to associate a certain sub-domain name with a specific certificate, and when doing this, the association between the sub-domain name and the certificate is saved.
Second, automatic association of certificate and sub-domain name
At present, a user only needs to upload a certificate related to a root domain name, does not need to manually bind, and intelligently associates with a sub-domain name according to the content of the certificate when distributing an SSL certificate to a node, as shown in fig. 3, the method includes:
step 1: extracting all certificates related to the root domain name, including valid certificates such as extensive analysis and the like;
step 2: extracting all sub-domain names needing acceleration under the root domain name, including sub-domain names such as extensive resolution and the like;
and step 3: traversing the sub-domain names, traversing all certificates associated with the root domain name for each sub-domain name, and preferentially and completely matching the available sub-domain names contained in the certificates; if a plurality of certificates completely match the sub-domain name, selecting the certificate with the longest expiration time for association; if no completely matched certificate is found, checking whether a universally analyzed certificate exists, if so, matching according to the principle that the SSL certificate has the longest expiration time, wherein if the universally analyzed certificate exists, the matching can be performed; if no matchable certificate is found, no association is made.
In the process of associating the certificate, a special situation needs to be handled, for example, a user needs to associate a certain sub-domain name with a specific certificate, and special handling is needed, the association needs to directly associate the certificate in the step one with the sub-domain name, and the association priority is highest so as to meet special requirements.
Third, SSL intelligent matching of CDN node
The certificate configuration of the user is synchronized to the CDN node and is associated with the domain name, if the CDN node is adjusted by the domain name, the certificate configuration can be synchronized along with the configuration of the domain name, the user is not required to configure an SSL certificate storage position, and intelligent and rapid synchronization is achieved. The CDN node is configured to find the SSL certificate lookup logic as shown in fig. 4, and includes:
step 1: the CDN node identifies whether the request is a handshake request of HTTPS or an HTTP request, if the request is the HTTP request, other processing is carried out, the next step is not continued, and otherwise domain name information is extracted;
step 2: searching a related certificate in a local database of the node according to the domain name information;
and step 3: if finding the SSL certificate, decrypting the certificate, extracting the certificate and establishing HTTPS connection with the private key; otherwise, returning to the HTTPS connection failure and the like.

Claims (3)

1. An SSL certificate intelligent binding and management method based on a CDN network is characterized by comprising the following steps:
step 1: user credential manipulation
The method comprises the following steps of performing certificate operation aiming at a certain root domain name, wherein the certificate operation comprises the steps of uploading a certificate, updating the certificate and deleting the certificate, and specifically comprises the following steps:
the uploading of the certificate comprises: 1) a user synthesizes a domain name SSL certificate, wherein the certificate comprises a website certificate and a private key; 2) selecting a domain name and uploading a certificate; 3) verifying the validity of the certificate, whether the certificate exists or not and whether the certificate is matched with the domain name or not; 4) generating a unique certificate ID-ssl _ ID, storing the certificate, and associating the certificate with the domain name; encrypting the certificate, and storing the certificate content, the available domain name and the expiration time;
updating the certificate includes: 1) selecting a designated certificate; 2) uploading a new certificate; 3) verifying whether the certificate is legal or not, whether the certificate is consistent with the original certificate or not, and whether the certificate is matched with the domain name or not; 4) updating the certificate;
deleting the certificate, namely deleting the certificate and the association of the certificate and the domain name;
step 2: the certificate is automatically associated with the sub-domain name, including:
1) extracting all certificates related to the root domain name, including universal analysis of valid certificates; 2) extracting all sub-domain names needing acceleration under the root domain name, including the sub-domain names which are subjected to extensive resolution; 3) traversing the sub-domain names, traversing all certificates associated with the root domain name for each sub-domain name, and preferentially and completely matching the available sub-domain names contained in the certificates; if a plurality of certificates are completely matched with the sub-domain name, selecting the certificate with the longest expiration time for association; if the completely matched certificate is not found, checking whether a universally analyzed certificate exists, if so, matching according to the principle that the SSL certificate has the longest expiration time, wherein if the universally analyzed certificate exists, the matching can be performed; if the matched certificate is not found, the certificate is not associated;
and step 3: CDN node SSL intelligence matches, includes:
1) judging whether the CDN node identifies that the request is a handshake request of HTTPS or an HTTP request, and if the request is the handshake request of the HTTPS, extracting domain name information; 2) searching for a related certificate in a local database of the node according to the domain name information; 3) if finding the SSL certificate, decrypting the certificate, extracting the certificate and the private key and establishing HTTPS connection; otherwise, returning to the HTTPS connection failure.
2. The intelligent binding and management method for SSL certificates based on CDN network as recited in claim 1, wherein when uploading and updating certificates, if the user wishes to associate a certain sub-domain name with a specific certificate, the association between the sub-domain name and the certificate is preserved during this process.
3. The intelligent binding and management method for SSL certificates based on CDN network as recited in claim 1, wherein in the certificate association process, if the user needs to associate a certain sub-domain name with a specific certificate, the association needs to directly associate the certificate in step 1 with the sub-domain name, and the association priority is highest.
CN201710792015.XA 2017-09-05 2017-09-05 SSL certificate intelligent binding and management method based on CDN Active CN107493174B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710792015.XA CN107493174B (en) 2017-09-05 2017-09-05 SSL certificate intelligent binding and management method based on CDN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710792015.XA CN107493174B (en) 2017-09-05 2017-09-05 SSL certificate intelligent binding and management method based on CDN

Publications (2)

Publication Number Publication Date
CN107493174A CN107493174A (en) 2017-12-19
CN107493174B true CN107493174B (en) 2020-12-15

Family

ID=60652144

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710792015.XA Active CN107493174B (en) 2017-09-05 2017-09-05 SSL certificate intelligent binding and management method based on CDN

Country Status (1)

Country Link
CN (1) CN107493174B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737111B (en) * 2018-05-24 2021-07-27 中国互联网络信息中心 Digital certificate processing method and device
CN110881064B (en) * 2018-09-06 2022-08-02 阿里巴巴集团控股有限公司 Domain name configuration method and device
CN111049789B (en) * 2018-10-15 2023-05-12 北京京东尚科信息技术有限公司 Domain name access method and device
CN110519239B (en) * 2019-08-09 2022-02-25 苏州浪潮智能科技有限公司 Protocol configuration method, device, equipment and readable storage medium
CN110766409A (en) * 2019-10-24 2020-02-07 深圳前海微众银行股份有限公司 SSL certificate verification method, device, equipment and computer storage medium
CN112235267A (en) * 2020-09-29 2021-01-15 北京金山云网络技术有限公司 Method, web server, relay server, medium, and system for loading certificate
CN115460083B (en) * 2021-06-09 2024-04-19 贵州白山云科技股份有限公司 Security acceleration service deployment method, device, medium and equipment
CN113901370B (en) * 2021-10-11 2023-09-08 北京百度网讯科技有限公司 Certificate deployment method, device, electronic equipment and storage medium
CN115801426B (en) * 2022-11-29 2023-06-23 杭州菲助科技有限公司 Method, device and medium for batch detection of residual validity period of sub domain name ssl certificate

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080263215A1 (en) * 2007-04-23 2008-10-23 Schnellbaecher Jan F Transparent secure socket layer
CN103227801A (en) * 2013-05-14 2013-07-31 网宿科技股份有限公司 Deploying method and system for HTTPS (Hypertext Transfer Protocol Secure) certificate based on content distribution network
CN103825906A (en) * 2014-03-14 2014-05-28 网宿科技股份有限公司 Enterprise private key self-encryption and self-arrangement method based on content distribution network
CN104094554A (en) * 2012-01-27 2014-10-08 微软公司 Implicit SSL certificate management without server name indication (SNI)
CN105846996A (en) * 2016-03-17 2016-08-10 上海携程商务有限公司 Automatic server certificate deployment system and method
CN106230782A (en) * 2016-07-20 2016-12-14 腾讯科技(深圳)有限公司 A kind of information processing method based on content distributing network and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080263215A1 (en) * 2007-04-23 2008-10-23 Schnellbaecher Jan F Transparent secure socket layer
CN104094554A (en) * 2012-01-27 2014-10-08 微软公司 Implicit SSL certificate management without server name indication (SNI)
CN103227801A (en) * 2013-05-14 2013-07-31 网宿科技股份有限公司 Deploying method and system for HTTPS (Hypertext Transfer Protocol Secure) certificate based on content distribution network
CN103825906A (en) * 2014-03-14 2014-05-28 网宿科技股份有限公司 Enterprise private key self-encryption and self-arrangement method based on content distribution network
CN105846996A (en) * 2016-03-17 2016-08-10 上海携程商务有限公司 Automatic server certificate deployment system and method
CN106230782A (en) * 2016-07-20 2016-12-14 腾讯科技(深圳)有限公司 A kind of information processing method based on content distributing network and device

Also Published As

Publication number Publication date
CN107493174A (en) 2017-12-19

Similar Documents

Publication Publication Date Title
CN107493174B (en) SSL certificate intelligent binding and management method based on CDN
CN111295869B (en) System and method for authenticating decentralized identity
US11070535B2 (en) Systems and methods for smartkey information management
US10534920B2 (en) Distributed data storage by means of authorisation token
US11128477B2 (en) Electronic certification system
US9516107B2 (en) Secure local server for synchronized online content management system
CN107111723B (en) User terminal, service providing apparatus, driving method of user terminal, driving method of service providing apparatus, and search system based on encryption index
US8572268B2 (en) Managing secure sessions
US8490165B2 (en) Restoring secure sessions
US7774611B2 (en) Enforcing file authorization access
CN111316303A (en) System and method for block chain based cross entity authentication
CN111213147A (en) System and method for block chain based cross entity authentication
US8365257B1 (en) Secure web portal with delegated secure administration
CN105516110B (en) Mobile device security data transmission method
US8332647B2 (en) System and method for dynamic multi-attribute authentication
US20200401718A1 (en) Secure storage of and access to files through a web application
US20160285832A1 (en) Secure consumption of platform services by applications
US10230695B2 (en) Distribution of secure data with entitlement enforcement
CA2717222A1 (en) System, device and method for securely transferring data across a network
CN104348870A (en) Data management method and system of cloud storage system based on trusted timestamp
CN111526161A (en) Communication method, communication equipment and proxy system
CN105072134A (en) Cloud disk system file secure transmission method based on three-level key
CN113468599A (en) File storage certificate method, device, system, equipment and storage medium
US20220200812A1 (en) Digital certificate and method for securely providing a public key
WO2021198750A1 (en) System and method to manage information and documents on a native blockchain network system including permissioned blockchain, storage, sharing, organisation, porting and various applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: 9/F, Block C, No. 28 Tianfu Avenue North Section, Chengdu High tech Zone, China (Sichuan) Pilot Free Trade Zone, Chengdu City, Sichuan Province, 610000

Patentee after: CHENGDU KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 610000, 11th floor, building 2, No. 219, Tianfu Third Street, hi tech Zone, Chengdu, Sichuan Province

Patentee before: CHENGDU KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.

CP02 Change in the address of a patent holder